Posts

Showing posts from January, 2016

How To Maximize Battery Life On Windows 10

Image
Windows 10 is one of the most polished and different than the most the previous Windows versions. However, the problem of Windows 10 battery life is a big headache. Know the steps on how to maximize the battery life on Windows 10.  Windows is known for poor battery life — irrespective of the Windows version you are using. People often wonder how to maximize battery life on Windows 10. Finally, we decided that we write an article over a guide to maximize the Windows 10 battery life: How to Maximize the Windows 10 battery life?Windows 10 battery saver mode:Windows 10 comes with two power modes: Battery saver mode and the default mode. Well, The battery saver mode surely stops your Windows from sucking your power. It reduces the battery usage as much as 20 percent on normal mode. Uninstall the unnecessary apps:Windows 10 comes with a plethora of apps. I, personally, do not use News app, Store and many other. These apps keep sucking the battery life in the background. So, it is better to un…

Nuclear Power Plants Are The Next Easy Target Of Hackers All Over The World

Image
Today, we are at a crossroads on nuclear security and the emerging threats in the form of cyber attacks and nuclear terrorism. Bur, our nuclear plants have failed to add necessary security measures to handle the cyber threats and potential security breaches. Based upon the two latest security reports, we have tried to assess the present day scenario which is too vulnerable. The nuclear power plants around the world are living in a state of denial about the risks of possible cyber attacks. These highly sensitive facilities have failed to install the necessary security measures to protect their computer networks. Apart from this, 20 countries with nuclear fuel stockpile don’t have any government regulations to install some minimum security steps. Such sorry state of our nuclear power plants was recently revealed in two different studies conducted by Security Operations Center (SOC) and the Nuclear Threat Initiative (NTI). Let’s tell you more about the situation: “Security measures employe…

Einstein’s Mass Energy Equation Is Insufficient, Claims Indian Researcher

Image
Prior to Einstein’s theory of special relativity, mass and energy were considered different entities. In 1905, German-born physicist Albert Einstein proposed that both are inter-convertible and energy is released in this process. In a recent development, an Indian researcher Ajay Sharma has claimed that Albert Einstein’s mass-energy equation hasn’t been  completely studied under all circumstances and it is inadequate. In an international paper, Ajay Sharma, an Indian researcher has claimed that Albert Einstein’s mass-energy equation – E=mc2– hasn’t been completely studied under all circumstances and it is inadequate. In his research paper, Mr. Sharma says that the equation has been studied only under special conditions of the parameters number of light waves, magnitude of light energy, angles at which waves are emitted and relative velocity v. Mr. Sharma writes in his paper that Einstein considered just two light waves of equal energy emitted in opposite direction with constant relative…

10-year-old Kid Scores 100 Percent in Java Exam, Completes 150 Minute Paper in 18 Minutes

Image
Some say prodigies are born. Yes! it’s true. They are born to surprise the world with the achievements that have never been attempted or broken before. Here is the story of Ronil Shah, a 10-year-old student from Ahmed-abad, who proved himself to be a child prodigy by scoring 100% in Java exam. Ronil Shah almost surprised everyone by scoring cent percent in a Java exam. Well, that’s not the end of the story. The story continues as he just finished the entire paper of 150 minutes in just 18 minutes. If you want to know the level of the paper, let me tell you that he competed in an exam which is generally taken by engineering graduates or professionals preparing to be software developers. That too, not all of the graduates crack it. The Java exam was held on September 2 last year. In the IT world, this exam is very famous and it’s called Java Standard Edition 6 Programmer Certified Professional examination. This exam is an international exam and it is conducted by US-based Oracle Universit…

( تقلید کیا ھے ؟؟؟؟ نہایت مختصر تشریح )

Image
( تقلید کیا ھے ؟؟؟؟ نہایت مختصر تشریح )                                                                                                        آج کے دور میں رنگ برنگی پگڑی والے علماء اور مولوی سادہ لوح اور کم علم مسلمانوں کو آپنے آپنے فرقوں اور اندھی تقلید میں پھنسا کر رکھنا چاھتے ہیں ۔۔۔ اور ہماری سادہ دل مسلمانوں کی اکثریت یہ سمجھتی ھے کہ لفظ تقلید بھی شاید قرآن وسنت کی ہی کوئی دینی اصطلاح ھے ۔۔۔ نہیں جناب یہ صرف اور صرف فرقہ وارانہ اور مزھبی اصطلاح ھے اس کا دین اسلام سے دور کا بھی واسطہ نہیں ھے اگر ایک باشعور مسلمان حقیقی معنوں میں تقلید ۔۔۔ مقلد اور غیر مقلد کا کا معنی جان لے تو وہ ایسی تمام اصطلاحات سے کوسوں رھے گا ۔۔ بلکہ وہ دین اسلام کا ماخذ صرف اور صرف قرآن وسنت کو مانے گا ۔۔ اس کے لغوی معنی ؟؟ جی لفظ تقلید کا مادہ ( ق ل د ) سے ھے اس سی سے لفظ قلادہ ھے جو گلے کے پٹے کو کہتے ہیں ۔۔۔ اور عربی میں تقلید کو گلے میں پٹہ ڈالنا ھوتا ھے ۔۔۔ اور مقلد اس جانور کو کہتے ہیں جس کے گلے میں پٹہ ھو اور رسی کسی دوسرے کے ھاتھ میں ھو اور وہ اسے کھینچتا جائے اور جانور اس کے پیچھے اندھا دھند چلتا ج…

The Problem With Nice People

Image
The Problem With Nice People IS That They Will Not Tell You That They Are Hurt But They Will Wait For You To Realize Your Mistake.

For More Updates: Click Here

New remote access Trojan Trochilus used in cyberespionage operations

Image
The program was used by a group that recently targeted organizations in MyanmarA cyber-espionage group has been discovered using a new remote access Trojan, dubbed Trochilus, whose detection rate was very low among antivirus products. The malware was discovered by researchers from Arbor Networks while investigating attacks in Myanmar that were launched from compromised government websites. The researchers linked the compromises to a sophisticated group of attackers known as Group 27, who are known to use different malware programs in their operations, some with overlapping capabilities. Read Also:How An SQL Injection Attack Works Arbor Networks has uncovered seven malware programs used by the group so far, including three remote access Trojans: PlugX, 9002, and the new Trochilus. "These seven packaged malware offer threat actors a variety of capabilities including the means to engage in espionage and the ability to move laterally within target networks in order to achieve more strateg…

Advertising Mistakes Small Businesses Make

Image
Sadly, as a small business owner you are much more likely to make costing online advertising mistakes than larger companies. The main reason for this is simple, as a small business you don’t have the in-house expertise many larger companies do have, for example you don’t often have staff experienced in the ins and outs of advertising. As a small business owner you can however avoid many costly mistakes, simply by knowing about them and then simply avoiding doing them. Placing the Focus ElsewhereThe focus always needs to be on your target audience (target customer), their specific problems and how you can solve them. NOT on your products and/or services. They want to know what’s in it for them, not what’s in it for you. Remember: always promote benefits over features. Read Also: Five Common Mistakes Leaders Make Being Unclear about Your Target AudienceIf you don’t know who your specific target audience is, it will be hard to create the right advertisements. Create target customer personas…

How to protect a Folder with password in Windows PC/laptop

Image
Secure your folder with password without using any additional software in your Windows 7/8.1/10 PC/laptopThis article will be helpful for those who want a better level of privacy than the level offered by basic OS functionalities. And also do not want to struggle with various software available as free or paid. In this article we will teach you to password protect a folder(and transfer your private stuff in it) just by using command prompt. Okay, first of all you need a text editor(notepad will do), and you have to copy the following code there. Replace “YourPassword” with the password you want to give to the folder (without double quotes). Read Also: 10 Ways to Move or Send Large Files on the Web cls
@echo off
echo amadahmad.blogspot.com
title Folder Private
if EXIST TWlock goto UNLOCK
if NOT EXIST Private goto MDLOCKER
:CONFIRM
echo Are you sure you want to lock the folder(Y/N)
set/p “cho=>”
if %cho%==Y goto LOCK
if %cho%==y goto LOCK
if %cho%==n goto END
if %cho%==N goto END
echo In…